Blog

$6 trillion will be invested in the Internet of Things (IoT) between 2015 and 2020, which will yield $12.6 trillion ROI over the next decade.

Until now, security has been treated as an afterthought; by adding layers of security after devices are delivered, and infrastructure and applications are already in place. Security for the IoT is too important to be treated an afterthought. To realize the full potential, the IoT ecosystem is forcing security from the beginning, built as part of the device and infrastructure.

In our earlier blog, we discussed the reasons why IoT Security needs a customer centric approach. This blog will follow on and explore the importance of having a strong device identity and integrity, which are the new perimeter for IoT. We will look at why we must combine device and user dimensions for device centric IoT Identity and Access Management (IAM) and why IoT devices are the weak link in the IoT Ecosystem.

Security is typically left as an oversight for many products today, simply because it is deemed too difficult to do and to facilitate effectively at scale. Security for many products is poorly thought through with little attention paid towards the use case, supply chain and business needs.

The IoT is expanding at a rapid rate and is expected to grow over the coming years at a pace which makes previous technology adoptions look insignificant. Predictions are that by 2020 there will be some +20 Billion connected devices worldwide. The IoT promises to connect everything from CCTV cameras, medical devices, smart home products to smart enabled vehicles and many more devices.

Last week we sponsored Smart Summit London. On our stand we discussed the future of Smart Cities and Industrial Internet with industry visionaries speaking at the event, customers implementing solutions and other IoT providers. Here are our 5 takeaway observations...

One of the unique aspects of Device Authority’s patented capabilities is the ability to provide secure valuable data analytics, which we call Counting Authenticated Devices. In a nutshell, our technology enables companies to continuously monitor large-scale networks of devices globally, and ensure:

As the world welcomes the new wave of IoT devices in through our WIFI-connected front doors and into our everyday lives, more and more companies are releasing ‘smart’ internet-enabled versions of historically analogue products that we would otherwise have to use without the aid of a mobile app.

What if an ambulance could process critical information about the patient before it arrives at the hospital, to allow for the patient to be examined before entering the hospital? What if the Equipment Manufacturer could accurately foresee the lifespan of life-saving equipment, dispatch an engineer, to proactively fix equipment before it fails?